1,230 research outputs found
Joint Power Control in Wiretap Interference Channels
Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to transmit such that its secrecy rate is maximized while the quality of service at the destination of the other user, user 2, is satisfied, and both user's power limits are taken into account. We consider two scenarios: 1) user 2 changes its power in favor of user 1, an altruistic scenario, 2) user 2 is selfish and only aims to maintain the minimum quality of service at its destination, an egoistic scenario. It is shown that there is a threshold for user 2's transmission power that only below or above which, depending on the channel qualities, user 1 can achieve a positive secrecy rate. Closed-form solutions are obtained in order to perform joint optimal power control. Further, a new metric called secrecy energy efficiency is introduced. We show that in general, the secrecy energy efficiency of user 1 in an interference channel scenario is higher than that of an interference-free channel
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints
In this paper, we study multibeam satellite secure communication through
physical (PHY) layer security techniques, i.e., joint power control and
beamforming. By first assuming that the Channel State Information (CSI) is
available and the beamforming weights are fixed, a novel secure satellite
system design is investigated to minimize the transmit power with individual
secrecy rate constraints. An iterative algorithm is proposed to obtain an
optimized power allocation strategy. Moreover, sub-optimal beamforming weights
are obtained by completely eliminating the co-channel interference and nulling
the eavesdroppers' signal simultaneously. In order to obtain jointly optimized
power allocation and beamforming strategy in some practical cases, e.g., with
certain estimation errors of the CSI, we further evaluate the impact of the
eavesdropper's CSI on the secure multibeam satellite system design. The
convergence of the iterative algorithm is proven under justifiable assumptions.
The performance is evaluated by taking into account the impact of the number of
antenna elements, number of beams, individual secrecy rate requirement, and
CSI. The proposed novel secure multibeam satellite system design can achieve
optimized power allocation to ensure the minimum individual secrecy rate
requirement. The results show that the joint beamforming scheme is more
favorable than fixed beamforming scheme, especially in the cases of a larger
number of satellite antenna elements and higher secrecy rate requirement.
Finally, we compare the results under the current satellite air-interface in
DVB-S2 and the results under Gaussian inputs.Comment: 34 pages, 10 figures, 1 table, submitted to "Transactions on
Information Forensics and Security
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding
In this paper, we propose a linear precoder for the downlink of a multi-user
MIMO system with multiple users that potentially act as eavesdroppers. The
proposed precoder is based on regularized channel inversion (RCI) with a
regularization parameter and power allocation vector chosen in such a
way that the achievable secrecy sum-rate is maximized. We consider the
worst-case scenario for the multi-user MIMO system, where the transmitter
assumes users cooperate to eavesdrop on other users. We derive the achievable
secrecy sum-rate and obtain the closed-form expression for the optimal
regularization parameter of the precoder using
large-system analysis. We show that the RCI precoder with
outperforms several other linear precoding schemes, and
it achieves a secrecy sum-rate that has same scaling factor as the sum-rate
achieved by the optimum RCI precoder without secrecy requirements. We propose a
power allocation algorithm to maximize the secrecy sum-rate for fixed .
We then extend our algorithm to maximize the secrecy sum-rate by jointly
optimizing and the power allocation vector. The jointly optimized
precoder outperforms RCI with and equal power allocation
by up to 20 percent at practical values of the signal-to-noise ratio and for 4
users and 4 transmit antennas.Comment: IEEE Transactions on Communications, accepted for publicatio
- …